1.0 Introduction
Recently, Apache has released security updates to a high-severity vulnerability in Apache Tomcat addressed as CVE-2025-24813.
2.0 Impact
This vulnerability allows malicious user to view security sensitive files and/or inject content into those files and perform remote code execution.
3.0 Affected Products
- Apache Tomcat 11.0.0-M1 to 11.02
- Apache Tomcat 10.1.0-M1 to 10.1.34
- Apache Tomcat 9.0.0.M1 to 9.0.98
4.0 Recommendations
CyberSecurity Malaysia urges users and organisations to review the
Apache Security Bulletin
, follow the Mitigation steps and apply the necessary updates.
Kindly refer to the URL for more information: https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq
Generally, Cyber999 advises the users of these devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please contact Cyber999 through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 08:30 -17.30 MYT
Web:
https://www.mycert.org.my
5.0 References
- https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq
- https://httpd.apache.org/download.cgi
- https://www.vicarius.io/vsociety/posts/cve-2025-24813-mitigate-apache-tomcat-rce
- https://www.vicarius.io/vsociety/posts/cve-2025-24813-detect-apache-tomcat-rce
- https://github.com/absholi7ly/POC-CVE-2025-24813/blob/main/README.md
- http://www.openwall.com/lists/oss-security/2025/03/10/5
- https://nvd.nist.gov/vuln/detail/CVE-2025-24813